(Publisher of Peer Reviewed Open Access Journals)

International Journal of Advanced Computer Research (IJACR)

ISSN (Print):2249-7277    ISSN (Online):2277-7970
Volume-13 Issue-65 December-2023
Full-Text PDF
Paper Title : Design of advanced intrusion detection system for multimodal fuzzy-based convolutional neural networks (mFCNN)
Author Name : K. Suresh Kumar, T. Ananth Kumar and R. Nishanth
Abstract :

The Internet of Things (IoT) develops a smart autonomous system capable of controlling and facilitating numerous human intervention activities such as inventory, electricity, traffic, and health management. It primarily operates by interconnecting networks and objects in various locations. Communication is carried out between devices to accomplish diverse missions in industrial, household, and healthcare applications. The involvement of the IoT in these applications renders the devices susceptible to cyber-attacks. In this work, an intelligent methodology was proposed to defend the devices against various security-related threats using modified deep learning algorithms. The intrusion detection system was designed using a hybrid model comprising multimodal fuzzy-based convolutional neural networks (mFCNN) in association with bidirectional long-short term memory (Bi-LSTM) and the enhanced code element embedding (ECEE) method. Here, the input for training is derived from real images, videos, and audio information retrieved from various sensors. Initially, the ECEE in each input frame is converted into suitable vectors. These vectors are then mapped to corresponding fixed-length vectors for embedding to achieve the most compressed representation. The Bi-LSTM is utilized for extracting relevant information related to spatial features, thus providing an effective intrusion detection mechanism. The mFCNN extracts the most critical temporal features by classifying contextual inputs using the captured videos and images. The experimental results demonstrate that the proposed hybrid model yields better results compared to existing methodologies, with the accuracy of protection benchmarked at 99.91%, which is higher than other baseline methods.

Keywords : Internet of Things (IoT), Cybersecurity, Deep learning algorithms, Intrusion detection systems, Hybrid neural networks.
Cite this article : Kumar KS, Kumar TA, Nishanth R. Design of advanced intrusion detection system for multimodal fuzzy-based convolutional neural networks (mFCNN). International Journal of Advanced Computer Research. 2023; 13(65):94-103. DOI:10.19101/IJACR.2023.1362035.
References :
[1]Kuzlu M, Fair C, Guler O. Role of artificial intelligence in the internet of things (IoT) cybersecurity. Discover Internet of Things. 2021; 1:1-4.
[Crossref] [Google Scholar]
[2]Rahman SA, Tout H, Talhi C, Mourad A. Internet of things intrusion detection: Centralized, on-device, or federated learning? IEEE Network. 2020; 34(6):310-7.
[Crossref] [Google Scholar]
[3]Dang QV. Studying machine learning techniques for intrusion detection systems. In future data and security engineering: 6th international conference, Nha Trang City, Vietnam, proceedings,2019 (pp. 411-26). Springer International Publishing.
[Crossref] [Google Scholar]
[4]Rajmohan R, Kumar TA, Julie EG, Robinson YH, Vimal S, Kadry S, et al. G-Sep:a deep learning algorithm for detection of long-term sepsis using bidirectional gated recurrent unit. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems. 2022; 30(Supp01):1-29.
[Crossref] [Google Scholar]
[5]Laghari AA, Wu K, Laghari RA, Ali M, Khan AA. A review and state of art of Internet of Things (IoT). Archives of Computational Methods in Engineering. 2021: 1-9.
[Crossref] [Google Scholar]
[6]Kumar KS, Mani AR, Sundaresan S, Kumar TA, Robinson YH. Blockchain-based energy-efficient smart green city in IoT environments. In blockchain for smart cities 2021 (pp. 81-103). Elsevier.
[Crossref] [Google Scholar]
[7]Magán-Carrión R, Urda D, Díaz-Cano I, Dorronsoro B. Towards a reliable comparison and evaluation of network intrusion detection systems based on machine learning approaches. Applied Sciences. 2020; 10(5):1775.
[Crossref] [Google Scholar]
[8]Kumar A, Purohit V, Bharti V, Singh R, Singh SK. Medisecfed: Private and secure medical image classification in the presence of malicious clients. IEEE Transactions on Industrial Informatics. 2021; 18(8):5648-57.
[Crossref] [Google Scholar]
[9]Rajmohan R, Pavithra M, Kumar TA, Manjubala P. Exploration of deep RNN architectures: LSTM and gru in medical diagnostics of cardiovascular and neuro diseases. In handbook of deep learning in biomedical engineering and health informatics 2021 (pp. 167-202). Apple Academic Press.
[Google Scholar]
[10]Sundaresan S, Kumar KS, Kumar TA, Ashok V, Julie EG. Blockchain architecture for intelligent water management system in smart cities. In blockchain for smart cities 2021 (pp. 57-80). Elsevier.
[Crossref] [Google Scholar]
[11]Hao S, Shi C, Cao L, Niu Z, Guo P. Learning deep relevance couplings for ad-hoc document retrieval. Expert Systems with Applications. 2021; 183:115335.
[Crossref] [Google Scholar]
[12]Otoum Y, Liu D, Nayak A. DL-IDS: a deep learning–based intrusion detection framework for securing IoT. Transactions on Emerging Telecommunications Technologies. 2022; 33(3): e3803.
[Crossref] [Google Scholar]
[13]Xu L, Zhou X, Tao Y, Liu L, Yu X, Kumar N. Intelligent security performance prediction for IoT-enabled healthcare networks using an improved CNN. IEEE Transactions on Industrial Informatics. 2021; 18(3):2063-74.
[Crossref] [Google Scholar]
[14]Elsayed MS, Le-Khac NA, Dev S, Jurcut AD. Machine-learning techniques for detecting attacks in SDN. In 7th international conference on computer science and network technology 2019 (pp. 277-81). IEEE.
[Crossref] [Google Scholar]
[15]Binbusayyis A, Vaiyapuri T. Unsupervised deep learning approach for network intrusion detection combining convolutional autoencoder and one-class SVM. Applied Intelligence. 2021; 51(10):7094-108.
[Crossref] [Google Scholar]
[16]Kumar TA, Rajmohan R, Adithya M, Sunder R. A novel security scheme using deep learning based low overhead localised flooding algorithm for wireless sensor networks. International Journal of Data Science. 2021; 6(1):19-32.
[Crossref] [Google Scholar]
[17]Sharma R, Vashisht V, Singh U. Performance analysis of evolutionary technique based partitional clustering algorithms for wireless sensor networks. In soft computing: theories and applications: proceedings of SoCTA 2018 (pp. 171-80). Springer Singapore.
[Crossref] [Google Scholar]
[18]Pontes CF, De Souza MM, Gondim JJ, Bishop M, Marotta MA. A new method for flow-based network intrusion detection using the inverse Potts model. IEEE Transactions on Network and Service Management. 2021; 18(2):1125-36.
[Crossref] [Google Scholar]
[19]Martins I, Resende JS, Sousa PR, Silva S, Antunes L, Gama J. Host-based IDS: a review and open issues of an anomaly detection system in IoT. Future Generation Computer Systems. 2022; 133:95-113.
[Crossref] [Google Scholar]
[20]He R, Schneider C, Ai B, Wang G, Zhong Z, Dupleich DA, et al. Propagation channels of 5G millimeter-wave vehicle-to-vehicle communications: recent advances and future challenges. IEEE Vehicular Technology Magazine. 2019; 15(1):16-26.
[Crossref] [Google Scholar]
[21]Feng YH, Dai YJ, Wang RZ, Ge TS. Insights into desiccant-based internally-cooled dehumidification using porous sorbents: From a modeling viewpoint. Applied Energy. 2022; 311:118732.
[Crossref] [Google Scholar]
[22]Zhou Z, Wang J, Ye Y. Exact BER analysis of differential chaos shift keying communication system in fading channels. Wireless Personal Communications. 2010; 53:299-310.
[Crossref] [Google Scholar]
[23]Angjelichinoski M, Trillingsgaard KF, Popovski P. A statistical learning approach to ultra-reliable low latency communication. IEEE Transactions on Communications. 2019; 67(7):5153-66.
[Crossref] [Google Scholar]
[24]Tegos SA, Diamantoulakis PD, Karagiannidis GK. On the performance of uplink rate-splitting multiple access. IEEE Communications Letters. 2022; 26(3):523-7.
[Crossref] [Google Scholar]
[25]Arumugam D, Govindaraju K, Tamilarasan AK. AIIoT-based smart framework for screening specific learning disabilities. In machine learning for critical internet of medical things: applications and use cases 2022 (pp. 103-24). Cham: Springer International Publishing.
[Crossref] [Google Scholar]
[26]Kumar TA, John A, Kumar CR. 2. IoT technology and applications. Internet of Things. 2020:43-62.
[Google Scholar]
[27]Alhussein M, Muhammad G, Hossain MS, Amin SU. Cognitive IoT-cloud integration for smart healthcare: case study for epileptic seizure detection and monitoring. Mobile Networks and Applications. 2018; 23:1624-35.
[Crossref] [Google Scholar]
[28]Samuel TA, Pavithra M, Mohan RR. LIFI-based radiation-free monitoring and transmission device for hospitals/public places. In multimedia and sensory input for augmented, mixed, and virtual reality 2021 (pp. 195-205). IGI Global.
[Crossref] [Google Scholar]
[29]Cao C, Liu X, Yang Y, Yu Y, Wang J, Wang Z, et al. Look and think twice: Capturing top-down visual attention with feedback convolutional neural networks. In proceedings of the IEEE international conference on computer vision 2015 (pp. 2956-64).
[Google Scholar]
[30]Khan FA, Gumaei A, Derhab A, Hussain A. A novel two-stage deep learning model for efficient network intrusion detection. IEEE Access. 2019; 7:30373-85.
[Crossref] [Google Scholar]
[31]Alqahtani M, Gumaei A, Mathkour H, Maher Ben Ismail M. A genetic-based extreme gradient boosting model for detecting intrusions in wireless sensor networks. Sensors. 2019; 19(20):4383.
[Crossref] [Google Scholar]
[32]Derhab A, Guerroumi M, Gumaei A, Maglaras L, Ferrag MA, Mukherjee M, et al. Blockchain and random subspace learning-based IDS for SDN-enabled industrial IoT security. Sensors. 2019; 19(14):3119.
[Crossref] [Google Scholar]